Global Patent Index - EP 3490216 A4

EP 3490216 A4 20190529 - RISK IDENTIFICATION METHOD, RISK IDENTIFICATION APPARATUS, AND CLOUD RISK IDENTIFICATION APPARATUS AND SYSTEM

Title (en)

RISK IDENTIFICATION METHOD, RISK IDENTIFICATION APPARATUS, AND CLOUD RISK IDENTIFICATION APPARATUS AND SYSTEM

Title (de)

RISIKOIDENTIFIZIERUNGSVERFAHREN, RISIKOIDENTIFIZIERUNGSVORRICHTUNG UND CLOUD-RISIKO-IDENTIFIZIERUNGSVORRICHTUNG UND -SYSTEM

Title (fr)

PROCÉDÉ D'IDENTIFICATION DE RISQUES, APPAREIL D'IDENTIFICATION DE RISQUES ET APPAREIL ET SYSTÈME D'IDENTIFICATION DE RISQUES EN NUAGE

Publication

EP 3490216 A4 20190529 (EN)

Application

EP 17830446 A 20170717

Priority

  • CN 201610587586 A 20160722
  • CN 2017093194 W 20170717

Abstract (en)

[origin: EP3490216A1] The present application discloses a risk identification method, a risk identification apparatus, and a cloud risk identification apparatus and system. The method includes the following: after collecting service data, performing, by an end-user device, risk identification on a service processing request that generates the service data based on a stored risk identification rule, and when a risk identification result cannot be determined, triggering a cloud risk identification device to perform risk identification on the service processing request that generates the service data. A distributed risk identification architecture is provided in the implementations of the present application. This effectively alleviates an existing technology's problem that a risk control server takes a relatively long time to process received data, which causes relatively low risk control efficiency; reduces the operation burden of the risk control server through this type of multi-layered risk identification; reduces overheads of system resources; and also completes risk identification on the end-user device, to shorten the time of risk identification, and improve user experience.

IPC 8 full level

H04L 29/06 (2006.01)

CPC (source: EP KR US)

G06Q 20/4016 (2013.01 - US); G06Q 40/08 (2013.01 - KR); H04L 63/1416 (2013.01 - EP US); H04L 67/51 (2022.05 - KR)

Citation (search report)

  • [I] ZHENG YAN ET AL: "Unwanted Traffic Control via Hybrid Trust Management", TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2012 IEEE 11TH INTERNATIONAL CONFERENCE ON, IEEE, 25 June 2012 (2012-06-25), pages 666 - 673, XP032233473, ISBN: 978-1-4673-2172-3, DOI: 10.1109/TRUSTCOM.2012.291
  • [A] ABRAHAM ET AL: "D-SCIDS: Distributed soft computing intrusion detection system", JOURNAL OF NETWORK AND COMPUTER APPLICAT, ACADEMIC PRESS, NEW YORK, NY, US, vol. 30, no. 1, 3 November 2006 (2006-11-03), pages 81 - 98, XP005732213, ISSN: 1084-8045, DOI: 10.1016/J.JNCA.2005.06.001
  • [A] "Intelligence-Based Systems Engineering", vol. 10, 1 January 2011, SPRINGER BERLIN HEIDELBERG, Berlin, Heidelberg, ISBN: 978-3-642-17930-3, article RAJA JURDAK ET AL: "Wireless Sensor Network Anomalies: Diagnosis and Detection Strategies", pages: 309 - 325, XP055444636, DOI: 10.1007/978-3-642-17931-0_12
  • See references of WO 2018014812A1

Designated contracting state (EPC)

AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

Designated extension state (EPC)

BA ME

DOCDB simple family (publication)

EP 3490216 A1 20190529; EP 3490216 A4 20190529; EP 3490216 B1 20220420; CN 107645483 A 20180130; CN 107645483 B 20210319; JP 2019523501 A 20190822; JP 6692000 B2 20200513; KR 102134547 B1 20200716; KR 20190032513 A 20190327; SG 11201900526W A 20190227; TW 201804392 A 20180201; US 2019156343 A1 20190523; US 2020250677 A1 20200806; WO 2018014812 A1 20180125

DOCDB simple family (application)

EP 17830446 A 20170717; CN 201610587586 A 20160722; CN 2017093194 W 20170717; JP 2019503330 A 20170717; KR 20197005334 A 20170717; SG 11201900526W A 20170717; TW 106119136 A 20170608; US 201916254473 A 20190122; US 201916725751 A 20191223